Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
6Activity
×
P. 1
S778/773 Rockefeller Internet Shutoff Control Bill

S778/773 Rockefeller Internet Shutoff Control Bill

Ratings:

5.0

(2)
|Views: 5,014|Likes:
Published by Guy Razer
Rockefeller wants to shut down the internet at his whim...
Rockefeller wants to shut down the internet at his whim...

More info:

Published by: Guy Razer on Apr 05, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

10/17/2011

pdf

text

original

 
II
[STAFF WORKING DRAFT]
M
 ARCH
31, 2009
111
TH
CONGRESS1
ST
S
ESSION
 
S. ——
To ensure the continued free flow of commerce within the United Statesand with its global trading partners through secure cyber communica-tions, to provide for the continued development and exploitation of theInternet and intranet communications for such purposes, to provide forthe development of a cadre of information technology specialists to im-prove and maintain effective cyber security defenses against disruption,and for other purposes.
IN THE SENATE OF THE UNITED STATES
M
 ARCH
——, 2009Mr. —————— (for himself, Mr. —————, and Mr. ————————) introduced the following bill; which was read twice and referred to theCommittee on ————————————
A BILL
To ensure the continued free flow of commerce within theUnited States and with its global trading partnersthrough secure cyber communications, to provide for thecontinued development and exploitation of the Internetand intranet communications for such purposes, to pro- vide for the development of a cadre of information tech-nology specialists to improve and maintain effective cy-
S:\WPSHR\LEGCNSL\XYWRITE\SCI09\CYBERSEC.4
March 31, 2009 (5:38 p.m.)
 
2
S —— IS
 bersecurity defenses against disruption, and for otherpurposes.
 Be it enacted by the Senate and House of Representa-
1
tives of the United States of America in Congress assembled,
2
SECTION 1. SHORT TITLE; TABLE OF CONTENTS.
3
(a) S
HORT
T
ITLE
.—This Act may be cited as the
4
‘‘Cybersecurity Act of 2009’’.
5
(b) T
 ABLE OF
C
ONTENTS
.—The table of contents for
6
this Act is as follows:
7
Sec.1.Short title; table of contents.Sec.2.Findings.Sec.3.Cybersecurity Advisory Panel.Sec.4.Real-time cybersecurity dashboard.Sec.5.State and regional cybersecurity enhancement program.Sec.6.NIST standards development and compliance.Sec.7.Licensing and certification of cybersecurity professionals.Sec.8.Review of NTIA domain name contracts.Sec.9.Secure domain name addressing system.Sec.10.Promoting cybersecurity awareness.Sec.11.Federal cybersecurity research and development.Sec.12.Federal Cyber Scholarship-for-Service program.Sec.13.Cybersecurity competition and challenge.Sec.14.Public–private clearinghouse.Sec.15.Cybersecurity risk management report.Sec.16.Legal framework review and report.Sec.17.Authentication and civil liberties report.Sec.18.Cybersecurity responsibilities and authorities.Sec.19.Quadrennial cyber review.Sec.20.Joint intelligence threat assessment.Sec.21.International norms and cybersecurity deterrence measures.Sec.22.Federal Secure Products and Services Acquisitions Board.Sec.23.Definitions.
SEC. 2. FINDINGS.
8
The Congress finds the following:
9
(1) America’s failure to protect cyberspace is
10
one of the most urgent national security problems
11
facing the country.
12
S:\WPSHR\LEGCNSL\XYWRITE\SCI09\CYBERSEC.4
March 31, 2009 (5:38 p.m.)
 
3
S —— IS
(2) Since intellectual property is now often
1
stored in digital form, industrial espionage that ex-
2
ploits weak cybersecurity dilutes our investment in
3
innovation while subsidizing the research and devel-
4
opment efforts of foreign competitors. In the new
5
global competition, where economic strength and
6
technological leadership are vital components of na-
7
tional power, failing to secure cyberspace puts us at
8
a disadvantage.
9
(3) According to the 2009 Annual Threat As-
10
sessment, ‘‘a successful cyber attack against a major
11
financial service provider could severely impact the
12
national economy, while cyber attacks against phys-
13
ical infrastructure computer systems such as those
14
that control power grids or oil refineries have the po-
15
tential to disrupt services for hours or weeks’’ and
16
that ‘‘Nation states and criminals target our govern-
17
ment and private sector information networks to
18
gain competitive advantage in the commercial sec-
19
tor.’’
20
(4) The Director of National Intelligence testi-
21
fied before the Congress on February 19, 2009 that
22
‘‘a growing array of state and non-state adversaries
23
are increasingly targeting-for exploitation and poten-
24
tially disruption or destruction-our information in-
25
S:\WPSHR\LEGCNSL\XYWRITE\SCI09\CYBERSEC.4
March 31, 2009 (5:38 p.m.)

Activity (6)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
gregorybr liked this
Lily Too liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->